nix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 28.091308] audit: type=1104 audit(1719906731.841:215): pid=1987 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 28.097402] audit: type=1131 audit(1719906731.841:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.20.226:22-139.178.89.65:60768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 28.662416] Initializing XFRM netlink socket This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:52:13 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: [ 41.416971] kauditd_printk_skb: 88 callbacks suppressed [ 41.416974] audit: type=1130 audit(1719906745.172:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 41.422987] audit: type=1131 audit(1719906745.172:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 41.787964] audit: type=1130 audit(1719906745.542:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 41.867202] audit: type=1131 audit(1719906745.622:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 48.170131] audit: type=1131 audit(1719906751.923:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 48.193742] audit: type=1334 audit(1719906751.947:260): prog-id=43 op=UNLOAD [ 48.195655] audit: type=1334 audit(1719906751.947:261): prog-id=42 op=UNLOAD [ 48.197318] audit: type=1334 audit(1719906751.947:262): prog-id=41 op=UNLOAD [ 51.482084] audit: type=1130 audit(1719906755.234:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 51.487881] audit: type=1131 audit(1719906755.234:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 51.962074] audit: type=1400 audit(1719906755.716:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 51.969225] audit: type=1400 audit(1719906755.716:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 51.974322] audit: type=1400 audit(1719906755.723:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 51.979380] audit: type=1400 audit(1719906755.723:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 53.495319] kauditd_printk_skb: 170 callbacks suppressed [ 53.495322] audit: type=1400 audit(1719906757.249:439): avc: denied { mac_admin } for pid=2356 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 53.502110] audit: type=1401 audit(1719906757.249:439): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 53.505860] audit: type=1300 audit(1719906757.249:439): arch=c000003e syscall=188 success=no exit=-22 a0=c000ba8720 a1=c000885de8 a2=c000ba86f0 a3=25 items=0 ppid=1 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) [ 53.515476] audit: type=1327 audit(1719906757.249:439): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 [ 53.523883] audit: type=1400 audit(1719906757.259:440): avc: denied { mac_admin } for pid=2356 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 53.530297] audit: type=1401 audit(1719906757.259:440): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 53.533833] audit: type=1300 audit(1719906757.259:440): arch=c000003e syscall=188 success=no exit=-22 a0=c000a24980 a1=c000885e00 a2=c000ba87b0 a3=25 items=0 ppid=1 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) [ 53.543399] audit: type=1327 audit(1719906757.259:440): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 [ 53.550044] audit: type=1325 audit(1719906757.286:441): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 53.554315] audit: type=1300 audit(1719906757.286:441): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd5cd33e10 a2=0 a3=7ffd5cd33dfc items=0 ppid=2356 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 60.965500] kauditd_printk_skb: 404 callbacks suppressed [ 60.965503] audit: type=1400 audit(1719906764.717:570): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 60.972865] audit: type=1400 audit(1719906764.717:571): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 60.978950] audit: type=1400 audit(1719906764.720:572): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 60.983811] audit: type=1400 audit(1719906764.720:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 60.989613] audit: type=1400 audit(1719906764.720:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 60.996362] audit: type=1400 audit(1719906764.720:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.001729] audit: type=1400 audit(1719906764.720:576): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.006964] audit: type=1400 audit(1719906764.720:577): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.007512] audit: audit_backlog=65 > audit_backlog_limit=64 [ 61.012743] audit: type=1400 audit(1719906764.720:578): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 68.920085] kauditd_printk_skb: 296 callbacks suppressed [ 68.920088] audit: type=1106 audit(1719906772.672:795): pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 68.926969] audit: type=1104 audit(1719906772.672:796): pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 68.953060] audit: type=1106 audit(1719906772.706:797): pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 68.960115] audit: type=1104 audit(1719906772.706:798): pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 68.965352] audit: type=1131 audit(1719906772.706:799): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.20.226:22-139.178.89.65:60772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 72.779129] audit: type=1400 audit(1719906776.532:800): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 72.788778] audit: type=1300 audit(1719906776.532:800): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edd1a0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) [ 72.801000] audit: type=1327 audit(1719906776.532:800): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 72.809734] audit: type=1400 audit(1719906776.538:801): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 72.818765] audit: type=1300 audit(1719906776.538:801): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edd360 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) [ 78.189897] kauditd_printk_skb: 10 callbacks suppressed [ 78.189900] audit: type=1400 audit(1719906781.942:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.195862] audit: type=1400 audit(1719906781.942:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.200253] audit: type=1400 audit(1719906781.942:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.204857] audit: type=1400 audit(1719906781.942:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.209514] audit: type=1400 audit(1719906781.942:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.214277] audit: type=1400 audit(1719906781.942:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.220305] audit: type=1400 audit(1719906781.942:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.225356] audit: type=1400 audit(1719906781.942:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.231393] audit: type=1400 audit(1719906781.942:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.240550] audit: type=1400 audit(1719906781.942:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 84.232724] kauditd_printk_skb: 357 callbacks suppressed [ 84.232726] audit: type=1325 audit(1719906787.985:916): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 84.240389] audit: type=1300 audit(1719906787.985:916): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdfcd25990 a2=0 a3=7ffdfcd2597c items=0 ppid=3061 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 84.250022] audit: type=1327 audit(1719906787.985:916): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 84.254607] audit: type=1325 audit(1719906787.986:917): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 84.259031] audit: type=1300 audit(1719906787.986:917): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdfcd25990 a2=0 a3=0 items=0 ppid=3061 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 84.269665] audit: type=1327 audit(1719906787.986:917): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 84.274390] audit: type=1325 audit(1719906788.017:918): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 84.279445] audit: type=1300 audit(1719906788.017:918): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffca8ff5ce0 a2=0 a3=7ffca8ff5ccc items=0 ppid=3061 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 84.287640] audit: type=1327 audit(1719906788.017:918): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 84.291227] audit: type=1325 audit(1719906788.029:919): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 89.718822] kauditd_printk_skb: 166 callbacks suppressed [ 89.718826] audit: type=1400 audit(1719906793.471:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.744221] audit: type=1400 audit(1719906793.471:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.754793] audit: type=1400 audit(1719906793.471:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.762144] audit: type=1400 audit(1719906793.471:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.768972] audit: type=1400 audit(1719906793.471:969): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.774291] audit: type=1400 audit(1719906793.471:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.780005] audit: type=1400 audit(1719906793.471:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.786076] audit: type=1400 audit(1719906793.471:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.791316] audit: type=1400 audit(1719906793.471:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.796874] audit: type=1400 audit(1719906793.471:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.397937] kauditd_printk_skb: 47 callbacks suppressed [ 95.397940] audit: type=1400 audit(1719906799.151:983): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.404488] audit: type=1300 audit(1719906799.151:983): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f7e8c1e2cb8 items=0 ppid=3348 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 95.411580] audit: type=1327 audit(1719906799.151:983): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361326138346265613163303664313038633461653865383666383337 [ 95.418934] audit: type=1400 audit(1719906799.151:984): avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.424437] audit: type=1400 audit(1719906799.151:984): avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.429808] audit: type=1400 audit(1719906799.151:984): avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.441256] audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.450394] audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.458636] audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.466597] audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.413778] kauditd_printk_skb: 40 callbacks suppressed [ 105.413780] audit: type=1400 audit(1719906809.166:992): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.419723] audit: type=1300 audit(1719906809.166:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb2c01ec2d8 items=0 ppid=3348 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 105.427671] audit: type=1327 audit(1719906809.166:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316131643437326266666238333137613139663631383839323736 [ 105.434583] audit: type=1400 audit(1719906809.166:993): avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.440072] audit: type=1400 audit(1719906809.166:993): avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.444582] audit: type=1400 audit(1719906809.166:993): avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.450409] audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.455502] audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.461013] audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.466986] audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.592124] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 105.593663] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:32 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:34 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: [ 111.017439] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 111.019122] IPv6: ADDRCONF(NETDEV_CHANGE): cali2a9ccba7796: link becomes ready [ 111.075903] kauditd_printk_skb: 157 callbacks suppressed [ 111.075906] audit: type=1325 audit(1719906814.827:1025): table=filter:101 family=2 entries=34 op=nft_register_chain pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" [ 111.085972] audit: type=1300 audit(1719906814.827:1025): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fffa41550b0 a2=0 a3=7fffa415509c items=0 ppid=3936 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 111.097027] audit: type=1327 audit(1719906814.827:1025): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 [ 111.165587] audit: type=1400 audit(1719906814.917:1026): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.170748] audit: type=1400 audit(1719906814.917:1027): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.176493] audit: type=1400 audit(1719906814.917:1028): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.181849] audit: type=1400 audit(1719906814.917:1029): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.186647] audit: type=1400 audit(1719906814.917:1030): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.191373] audit: type=1400 audit(1719906814.917:1031): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.195807] audit: type=1400 audit(1719906814.917:1032): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.907340] IPv6: ADDRCONF(NETDEV_CHANGE): caliec1e069b5a0: link becomes ready [ 111.995349] IPv6: ADDRCONF(NETDEV_CHANGE): calie1d06b0bbeb: link becomes ready [ 112.936879] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 112.938348] IPv6: ADDRCONF(NETDEV_CHANGE): calib9ce3fdd110: link becomes ready This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:37 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:38 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:39 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:40 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: [ 116.892975] kauditd_printk_skb: 416 callbacks suppressed [ 116.892978] audit: type=1400 audit(1719906820.645:1158): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 116.907713] audit: type=1300 audit(1719906820.645:1158): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c180c0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) [ 116.923655] audit: type=1327 audit(1719906820.645:1158): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 116.935648] audit: type=1400 audit(1719906820.659:1159): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 116.944651] audit: type=1300 audit(1719906820.659:1159): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c597c0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) [ 116.959335] audit: type=1327 audit(1719906820.659:1159): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 117.355366] audit: type=1400 audit(1719906821.107:1160): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 117.359562] audit: type=1400 audit(1719906821.107:1161): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 117.365639] audit: type=1400 audit(1719906821.107:1162): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 60.983811] audit: type=1400 audit(1719906764.720:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 60.989613] audit: type=1400 audit(1719906764.720:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 60.996362] audit: type=1400 audit(1719906764.720:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.001729] audit: type=1400 audit(1719906764.720:576): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.006964] audit: type=1400 audit(1719906764.720:577): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.007512] audit: audit_backlog=65 > audit_backlog_limit=64 [ 61.012743] audit: type=1400 audit(1719906764.720:578): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 68.920085] kauditd_printk_skb: 296 callbacks suppressed [ 68.920088] audit: type=1106 audit(1719906772.672:795): pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 68.926969] audit: type=1104 audit(1719906772.672:796): pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 68.953060] audit: type=1106 audit(1719906772.706:797): pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 68.960115] audit: type=1104 audit(1719906772.706:798): pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 68.965352] audit: type=1131 audit(1719906772.706:799): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.20.226:22-139.178.89.65:60772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 72.779129] audit: type=1400 audit(1719906776.532:800): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 72.788778] audit: type=1300 audit(1719906776.532:800): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edd1a0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) [ 72.801000] audit: type=1327 audit(1719906776.532:800): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 72.809734] audit: type=1400 audit(1719906776.538:801): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 72.818765] audit: type=1300 audit(1719906776.538:801): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edd360 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) [ 78.189897] kauditd_printk_skb: 10 callbacks suppressed [ 78.189900] audit: type=1400 audit(1719906781.942:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.195862] audit: type=1400 audit(1719906781.942:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.200253] audit: type=1400 audit(1719906781.942:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.204857] audit: type=1400 audit(1719906781.942:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.209514] audit: type=1400 audit(1719906781.942:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.214277] audit: type=1400 audit(1719906781.942:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.220305] audit: type=1400 audit(1719906781.942:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.225356] audit: type=1400 audit(1719906781.942:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.231393] audit: type=1400 audit(1719906781.942:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.240550] audit: type=1400 audit(1719906781.942:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 84.232724] kauditd_printk_skb: 357 callbacks suppressed [ 84.232726] audit: type=1325 audit(1719906787.985:916): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 84.240389] audit: type=1300 audit(1719906787.985:916): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdfcd25990 a2=0 a3=7ffdfcd2597c items=0 ppid=3061 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 84.250022] audit: type=1327 audit(1719906787.985:916): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 84.254607] audit: type=1325 audit(1719906787.986:917): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 84.259031] audit: type=1300 audit(1719906787.986:917): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdfcd25990 a2=0 a3=0 items=0 ppid=3061 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 84.269665] audit: type=1327 audit(1719906787.986:917): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 84.274390] audit: type=1325 audit(1719906788.017:918): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 84.279445] audit: type=1300 audit(1719906788.017:918): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffca8ff5ce0 a2=0 a3=7ffca8ff5ccc items=0 ppid=3061 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 84.287640] audit: type=1327 audit(1719906788.017:918): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 84.291227] audit: type=1325 audit(1719906788.029:919): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 89.718822] kauditd_printk_skb: 166 callbacks suppressed [ 89.718826] audit: type=1400 audit(1719906793.471:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.744221] audit: type=1400 audit(1719906793.471:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.754793] audit: type=1400 audit(1719906793.471:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.762144] audit: type=1400 audit(1719906793.471:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.768972] audit: type=1400 audit(1719906793.471:969): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.774291] audit: type=1400 audit(1719906793.471:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.780005] audit: type=1400 audit(1719906793.471:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.786076] audit: type=1400 audit(1719906793.471:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.791316] audit: type=1400 audit(1719906793.471:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.796874] audit: type=1400 audit(1719906793.471:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.397937] kauditd_printk_skb: 47 callbacks suppressed [ 95.397940] audit: type=1400 audit(1719906799.151:983): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.404488] audit: type=1300 audit(1719906799.151:983): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f7e8c1e2cb8 items=0 ppid=3348 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 95.411580] audit: type=1327 audit(1719906799.151:983): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361326138346265613163303664313038633461653865383666383337 [ 95.418934] audit: type=1400 audit(1719906799.151:984): avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.424437] audit: type=1400 audit(1719906799.151:984): avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.429808] audit: type=1400 audit(1719906799.151:984): avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.441256] audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.450394] audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.458636] audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 95.466597] audit: type=1400 audit(1719906799.151:984): avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.413778] kauditd_printk_skb: 40 callbacks suppressed [ 105.413780] audit: type=1400 audit(1719906809.166:992): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.419723] audit: type=1300 audit(1719906809.166:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb2c01ec2d8 items=0 ppid=3348 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 105.427671] audit: type=1327 audit(1719906809.166:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316131643437326266666238333137613139663631383839323736 [ 105.434583] audit: type=1400 audit(1719906809.166:993): avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.440072] audit: type=1400 audit(1719906809.166:993): avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.444582] audit: type=1400 audit(1719906809.166:993): avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.450409] audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.455502] audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.461013] audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.466986] audit: type=1400 audit(1719906809.166:993): avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 105.592124] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 105.593663] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:32 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:34 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: [ 111.017439] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 111.019122] IPv6: ADDRCONF(NETDEV_CHANGE): cali2a9ccba7796: link becomes ready [ 111.075903] kauditd_printk_skb: 157 callbacks suppressed [ 111.075906] audit: type=1325 audit(1719906814.827:1025): table=filter:101 family=2 entries=34 op=nft_register_chain pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" [ 111.085972] audit: type=1300 audit(1719906814.827:1025): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fffa41550b0 a2=0 a3=7fffa415509c items=0 ppid=3936 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 111.097027] audit: type=1327 audit(1719906814.827:1025): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 [ 111.165587] audit: type=1400 audit(1719906814.917:1026): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.170748] audit: type=1400 audit(1719906814.917:1027): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.176493] audit: type=1400 audit(1719906814.917:1028): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.181849] audit: type=1400 audit(1719906814.917:1029): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.186647] audit: type=1400 audit(1719906814.917:1030): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.191373] audit: type=1400 audit(1719906814.917:1031): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.195807] audit: type=1400 audit(1719906814.917:1032): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.907340] IPv6: ADDRCONF(NETDEV_CHANGE): caliec1e069b5a0: link becomes ready [ 111.995349] IPv6: ADDRCONF(NETDEV_CHANGE): calie1d06b0bbeb: link becomes ready [ 112.936879] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 112.938348] IPv6: ADDRCONF(NETDEV_CHANGE): calib9ce3fdd110: link becomes ready This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:37 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:38 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:39 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:53:40 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: [ 116.892975] kauditd_printk_skb: 416 callbacks suppressed [ 116.892978] audit: type=1400 audit(1719906820.645:1158): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 116.907713] audit: type=1300 audit(1719906820.645:1158): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c180c0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) [ 116.923655] audit: type=1327 audit(1719906820.645:1158): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 116.935648] audit: type=1400 audit(1719906820.659:1159): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 116.944651] audit: type=1300 audit(1719906820.659:1159): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c597c0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) [ 116.959335] audit: type=1327 audit(1719906820.659:1159): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 117.355366] audit: type=1400 audit(1719906821.107:1160): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 117.359562] audit: type=1400 audit(1719906821.107:1161): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 117.365639] audit: type=1400 audit(1719906821.107:1162): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 117.369972] audit: type=1400 audit(1719906821.107:1163): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 125.145095] kauditd_printk_skb: 125 callbacks suppressed [ 125.145099] audit: type=1130 audit(1719906828.896:1199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.20.226:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 125.365892] audit: type=1101 audit(1719906829.118:1200): pid=5005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 125.373244] audit: type=1103 audit(1719906829.125:1201): pid=5005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 125.379607] audit: type=1006 audit(1719906829.125:1202): pid=5005 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 [ 125.384238] audit: type=1300 audit(1719906829.125:1202): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff27821080 a2=3 a3=0 items=0 ppid=1 pid=5005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 125.392269] audit: type=1327 audit(1719906829.125:1202): proctitle=737368643A20636F7265205B707269765D [ 125.404576] audit: type=1105 audit(1719906829.156:1203): pid=5005 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 125.412389] audit: type=1103 audit(1719906829.163:1204): pid=5007 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 125.712860] audit: type=1106 audit(1719906829.465:1205): pid=5005 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 125.721728] audit: type=1104 audit(1719906829.465:1206): pid=5005 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 131.734219] kauditd_printk_skb: 23 callbacks suppressed [ 131.734222] audit: type=1130 audit(1719906835.486:1226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.20.226:22-139.178.89.65:45008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 131.905098] audit: type=1101 audit(1719906835.657:1227): pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 131.912011] audit: type=1103 audit(1719906835.663:1228): pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 131.918184] audit: type=1006 audit(1719906835.664:1229): pid=5069 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 [ 131.922438] audit: type=1300 audit(1719906835.664:1229): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd44a13d50 a2=3 a3=0 items=0 ppid=1 pid=5069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 131.929833] audit: type=1327 audit(1719906835.664:1229): proctitle=737368643A20636F7265205B707269765D [ 131.935232] audit: type=1105 audit(1719906835.687:1230): pid=5069 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 131.942031] audit: type=1103 audit(1719906835.694:1231): pid=5071 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 132.172092] audit: type=1106 audit(1719906835.924:1232): pid=5069 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 132.179259] audit: type=1104 audit(1719906835.925:1233): pid=5069 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 137.210242] kauditd_printk_skb: 13 callbacks suppressed [ 137.210245] audit: type=1130 audit(1719906840.962:1239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.20.226:22-139.178.89.65:38572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 137.432859] audit: type=1101 audit(1719906841.184:1240): pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 137.445260] audit: type=1103 audit(1719906841.195:1241): pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 137.453645] audit: type=1006 audit(1719906841.198:1242): pid=5107 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 [ 137.458415] audit: type=1300 audit(1719906841.198:1242): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe443699f0 a2=3 a3=0 items=0 ppid=1 pid=5107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 137.467495] audit: type=1327 audit(1719906841.198:1242): proctitle=737368643A20636F7265205B707269765D [ 137.476875] audit: type=1105 audit(1719906841.229:1243): pid=5107 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 137.484352] audit: type=1103 audit(1719906841.237:1244): pid=5109 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 137.752343] audit: type=1106 audit(1719906841.504:1245): pid=5107 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 137.761564] audit: type=1104 audit(1719906841.504:1246): pid=5107 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 142.776937] kauditd_printk_skb: 1 callbacks suppressed [ 142.776940] audit: type=1130 audit(1719906846.529:1248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.20.226:22-139.178.89.65:38584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 142.939157] audit: type=1101 audit(1719906846.691:1249): pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 142.946189] audit: type=1103 audit(1719906846.698:1250): pid=5125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 142.952875] audit: type=1006 audit(1719906846.698:1251): pid=5125 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 [ 142.956845] audit: type=1300 audit(1719906846.698:1251): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5d3500d0 a2=3 a3=0 items=0 ppid=1 pid=5125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 142.963516] audit: type=1327 audit(1719906846.698:1251): proctitle=737368643A20636F7265205B707269765D [ 142.971639] audit: type=1105 audit(1719906846.724:1252): pid=5125 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 142.981878] audit: type=1103 audit(1719906846.728:1253): pid=5127 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 143.185961] audit: type=1106 audit(1719906846.938:1254): pid=5125 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 143.193690] audit: type=1104 audit(1719906846.938:1255): pid=5125 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.217938] kauditd_printk_skb: 1 callbacks suppressed [ 148.217941] audit: type=1130 audit(1719906851.970:1257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.20.226:22-139.178.89.65:49208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 148.432626] audit: type=1101 audit(1719906852.185:1258): pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.439456] audit: type=1103 audit(1719906852.191:1259): pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.448824] audit: type=1006 audit(1719906852.192:1260): pid=5166 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 [ 148.457489] audit: type=1300 audit(1719906852.192:1260): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff44eb6950 a2=3 a3=0 items=0 ppid=1 pid=5166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 148.465358] audit: type=1327 audit(1719906852.192:1260): proctitle=737368643A20636F7265205B707269765D [ 148.475033] audit: type=1105 audit(1719906852.216:1261): pid=5166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.483981] audit: type=1103 audit(1719906852.219:1262): pid=5168 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.846605] audit: type=1106 audit(1719906852.598:1263): pid=5166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.857449] audit: type=1104 audit(1719906852.598:1264): pid=5166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 151.654911] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 151.656516] IPv6: ADDRCONF(NETDEV_CHANGE): cali6262f6226a1: link becomes ready [ 153.229910] kauditd_printk_skb: 106 callbacks suppressed [ 153.229922] audit: type=1131 audit(1719906856.982:1310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.20.226:22-139.178.89.65:49222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 153.245619] audit: type=1130 audit(1719906856.997:1311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.20.226:22-139.178.89.65:49234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 153.432778] audit: type=1101 audit(1719906857.185:1312): pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 153.439591] audit: type=1103 audit(1719906857.191:1313): pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 153.449444] audit: type=1006 audit(1719906857.191:1314): pid=5287 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 [ 153.460100] audit: type=1300 audit(1719906857.191:1314): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd08d38490 a2=3 a3=0 items=0 ppid=1 pid=5287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 153.468838] audit: type=1327 audit(1719906857.191:1314): proctitle=737368643A20636F7265205B707269765D [ 153.474941] audit: type=1105 audit(1719906857.226:1315): pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 153.482997] audit: type=1103 audit(1719906857.227:1316): pid=5289 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' This is ip-172-31-20-226 (Linux x86_64 5.15.161-flatcar) 07:54:17 SSH host key: SHA256:/PWVVODs7ksMJHM3roig53dpUr0iez80JP5R8bZm8+E (ECDSA) SSH host key: SHA256:UrFOK/YEyyAkkNrHgfzgkby+hfC4S4MkRDGFTzYKdLI (RSA) SSH host key: SHA256:sUxypbWusBtSw+EtEFQZwFUqULt4VGmGQifQu7uVhP0 (ED25519) eth0: 172.31.20.226 fe80::40f:a9ff:fe39:33a5 ip-172-31-20-226 login: [ 155.007316] audit: type=1106 audit(1719906858.759:1317): pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 160.742732] kauditd_printk_skb: 91 callbacks suppressed [ 160.742735] audit: type=1130 audit(1719906864.495:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.20.226:22-139.178.89.65:47744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 160.973648] audit: type=1101 audit(1719906864.726:1355): pid=5378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 160.989129] audit: type=1103 audit(1719906864.740:1356): pid=5378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 160.999416] audit: type=1006 audit(1719906864.740:1357): pid=5378 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 [ 161.004349] audit: type=1300 audit(1719906864.740:1357): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5a09ad80 a2=3 a3=0 items=0 ppid=1 pid=5378 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 161.010818] audit: type=1327 audit(1719906864.740:1357): proctitle=737368643A20636F7265205B707269765D [ 161.025438] audit: type=1105 audit(1719906864.777:1358): pid=5378 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 161.033830] audit: type=1103 audit(1719906864.783:1359): pid=5380 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 161.394507] audit: type=1106 audit(1719906865.147:1360): pid=5378 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 161.401663] audit: type=1104 audit(1719906865.147:1361): pid=5378 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 166.423843] kauditd_printk_skb: 7 callbacks suppressed [ 166.423846] audit: type=1130 audit(1719906870.176:1365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.20.226:22-139.178.89.65:39266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 166.596832] audit: type=1101 audit(1719906870.349:1366): pid=5395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 166.604387] audit: type=1103 audit(1719906870.356:1367): pid=5395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 166.610405] audit: type=1006 audit(1719906870.356:1368): pid=5395 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 [ 166.614293] audit: type=1300 audit(1719906870.356:1368): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd115e1c0 a2=3 a3=0 items=0 ppid=1 pid=5395 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 166.620375] audit: type=1327 audit(1719906870.356:1368): proctitle=737368643A20636F7265205B707269765D [ 166.633484] audit: type=1105 audit(1719906870.386:1369): pid=5395 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 166.641498] audit: type=1103 audit(1719906870.388:1370): pid=5397 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 166.842128] audit: type=1106 audit(1719906870.594:1371): pid=5395 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 166.857805] audit: type=1104 audit(1719906870.594:1372): pid=5395 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 171.875097] kauditd_printk_skb: 1 callbacks suppressed [ 171.875099] audit: type=1130 audit(1719906875.628:1374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.20.226:22-139.178.89.65:39272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 172.070353] audit: type=1101 audit(1719906875.822:1375): pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 172.076693] audit: type=1103 audit(1719906875.828:1376): pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 172.082805] audit: type=1006 audit(1719906875.828:1377): pid=5414 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 [ 172.087337] audit: type=1300 audit(1719906875.828:1377): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5c6a78c0 a2=3 a3=0 items=0 ppid=1 pid=5414 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 172.093668] audit: type=1327 audit(1719906875.828:1377): proctitle=737368643A20636F7265205B707269765D [ 172.108718] audit: type=1105 audit(1719906875.861:1378): pid=5414 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 172.115840] audit: type=1103 audit(1719906875.868:1379): pid=5419 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 172.306053] audit: type=1106 audit(1719906876.058:1380): pid=5414 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 172.312987] audit: type=1104 audit(1719906876.058:1381): pid=5414 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 176.919846] kauditd_printk_skb: 1 callbacks suppressed [ 176.919849] audit: type=1400 audit(1719906880.672:1383): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 176.926722] audit: type=1400 audit(1719906880.679:1384): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 176.932680] audit: type=1300 audit(1719906880.679:1384): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c59aa0 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) [ 176.940023] audit: type=1327 audit(1719906880.679:1384): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 176.947091] audit: type=1300 audit(1719906880.672:1383): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010c3860 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c969 key=(null) [ 176.954658] audit: type=1327 audit(1719906880.672:1383): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 177.336805] audit: type=1130 audit(1719906881.089:1385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.20.226:22-139.178.89.65:40156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 177.539172] audit: type=1101 audit(1719906881.291:1386): pid=5452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 177.546163] audit: type=1103 audit(1719906881.298:1387): pid=5452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 177.551654] audit: type=1006 audit(1719906881.298:1388): pid=5452 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 [ 183.026304] kauditd_printk_skb: 31 callbacks suppressed [ 183.026307] audit: type=1130 audit(1719906886.778:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.20.226:22-139.178.89.65:40160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 183.196400] audit: type=1101 audit(1719906886.948:1403): pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 183.211354] audit: type=1103 audit(1719906886.964:1404): pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 183.223723] audit: type=1006 audit(1719906886.964:1405): pid=5471 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 [ 183.229773] audit: type=1300 audit(1719906886.964:1405): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf8808090 a2=3 a3=0 items=0 ppid=1 pid=5471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 183.239242] audit: type=1327 audit(1719906886.964:1405): proctitle=737368643A20636F7265205B707269765D [ 183.257004] audit: type=1105 audit(1719906887.009:1406): pid=5471 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 183.272070] audit: type=1103 audit(1719906887.013:1407): pid=5473 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 183.625327] audit: type=1106 audit(1719906887.376:1408): pid=5471 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 183.636308] audit: type=1104 audit(1719906887.376:1409): pid=5471 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 188.644376] kauditd_printk_skb: 1 callbacks suppressed [ 188.644379] audit: type=1130 audit(1719906892.397:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.20.226:22-139.178.89.65:40624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 188.842464] audit: type=1101 audit(1719906892.595:1412): pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 188.851234] audit: type=1103 audit(1719906892.603:1413): pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 188.857020] audit: type=1006 audit(1719906892.603:1414): pid=5510 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 [ 188.861419] audit: type=1300 audit(1719906892.603:1414): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4a660620 a2=3 a3=0 items=0 ppid=1 pid=5510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 188.868182] audit: type=1327 audit(1719906892.603:1414): proctitle=737368643A20636F7265205B707269765D [ 188.880189] audit: type=1105 audit(1719906892.632:1415): pid=5510 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 188.888373] audit: type=1103 audit(1719906892.641:1416): pid=5512 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 189.209883] audit: type=1106 audit(1719906892.962:1417): pid=5510 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 189.219358] audit: type=1104 audit(1719906892.963:1418): pid=5510 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 203.093813] kauditd_printk_skb: 13 callbacks suppressed [ 203.093816] audit: type=1334 audit(1719906906.846:1424): prog-id=80 op=UNLOAD [ 203.097624] audit: type=1334 audit(1719906906.846:1425): prog-id=96 op=UNLOAD [ 204.049052] audit: type=1400 audit(1719906907.800:1426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 204.053399] audit: type=1400 audit(1719906907.800:1427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 204.058427] audit: type=1400 audit(1719906907.800:1428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 204.062742] audit: type=1400 audit(1719906907.800:1429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 204.067066] audit: type=1400 audit(1719906907.800:1430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 204.071462] audit: type=1400 audit(1719906907.800:1431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 204.075895] audit: type=1400 audit(1719906907.800:1432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 204.080252] audit: type=1400 audit(1719906907.800:1433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 209.082929] kauditd_printk_skb: 116 callbacks suppressed [ 209.082931] audit: type=1400 audit(1719906912.835:1468): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 209.088775] audit: type=1400 audit(1719906912.835:1469): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 209.093442] audit: type=1400 audit(1719906912.835:1470): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 209.098024] audit: type=1400 audit(1719906912.835:1471): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 209.104398] audit: type=1400 audit(1719906912.835:1472): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 209.109613] audit: type=1400 audit(1719906912.835:1473): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 209.115566] audit: type=1400 audit(1719906912.835:1474): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 209.120762] audit: type=1400 audit(1719906912.835:1475): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 209.125914] audit: type=1400 audit(1719906912.835:1476): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 209.131007] audit: type=1400 audit(1719906912.841:1477): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0